Page 224 - Privacy in a Cyber Age Policy and Practice
P. 224

212  NOTES

           22.  This is a bit of a simplification, but largely captures the NSA’s operating
              procedures. For a more nuanced discussion, see Marc Ambinder, “How the
              NSA Uses Your Telephone Records,” The Week, June 6, 2013, http://theweek.
              com/article/index/245285/how-the-nsa-uses-your-telephone-records.
           23.  Jack Nicas, “TSA to Halt Revealing Body Scans at Airports,” Wall Street Journal,
              January 18, 2013.
           24.  Legal Information Institute, “Fourth Amendment,” Cornell University Law
              School. http://www.law.cornell.edu/wex/fourth_amendment (accessed 12 July
              2013).
           25. See  Electronic Privacy Information Center v. United States Department of
              Homeland Security, 653 F.3d 1, 10–11 (D.C. Cir. 2011); and National Treasury
              Employees Union v. Von Raab, 489 U.S. 656, 674–675 & n.3 (1989).
           26. See Michigan Department of State Police v. Sitz, 110 S. Ct. 2481 (1990).
           27. See Skinner v. Railway Labor Executives’ Association, 489 U.S. 602 (1989); and
              National Treasury Employees Union v. Von Raab, 489 U.S. 656 (1989).
           28.  USA Patriot Act. Pub. L. 107-56. 115 Stat. 272. October 26, 2011. Accessed at
              http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/html/PLAW-107publ56.htm
           29.  Scott Shane and David E. Sanger, “Job Title Key to Inner Access Held
              by Snowden,”  The New York Times, June 30, 2013, http://www.nytimes.
              com/2013/07/01/us/job-title-key-to-inner-access-held-by-snowden.html?
              pagewanted=all.
           30.  Jeffrey Rosen, “The Naked Crowd: Balancing Privacy and Security in an Age of
              Terror,” Arizona Law Review 46 (2004): 611.
           31.  Beth Givens, “Public Records on the Internet: The Privacy Dilemma,” Privacy
              Rights Clearinghouse, http://www.cfp2002.org/proceedings/proceedings/
              givens.pdf.
           32.  See Amitai Etzioni and Radhika Bhat, “Second Chances, Social Forgiveness, and
              the Internet,” The American Scholar (Spring 2009), http://theamericanscholar.
              org/second-chances-social-forgiveness-and-the-internet/#.Udx70DtilJk.
           33.  Most recent numbers from 2011. Federal Bureau of Investigation, “Clear-
              ances,” Crime in the United States, 2011, http://www.fbi.gov/about-us/cjis/ucr/
              crime-in-the-u.s/2011/crime-in-the-u.s.-2011/clearances.
           34.  Matthew C. Waxman, in an interview with Jonathan Masters, “Has the FISA Court
              Gone Too Far?” Council on Foreign Relations, July 12, 2013, http://www.cfr.org/
              intelligence/has-fisa-court-gone-too-far/p31095. See also, Shaun Waterman,
              “Officials Say Americans Protected by Prism Surveillance Program,” The Wash-
              ington Times, June 10, 2013, http://www.washingtontimes.com/news/2013/
              jun/10/officials-say-americans-protected-by-prism-surveil/?page=all.
           35.  See, for example, GAO-05-866 “Agencies have Taken Key Steps to Protect Pri-
              vacy in Selected Efforts, but Significant Compliance Issues Remain” (August
              2005); GAO-08-536 “Alternatives Exist for Enhancing Protection of Personally
              Identifiable Information” (May 2008); GAO-12-961T “Federal Law Should Be
              Updated to Address Changing Technology Landscape” (July 2012); or GAO-
              12-981 “Measuring Progress and Addressing Potential Privacy Concerns Would
              Facilitate Integration into the National Airspace System” (September 2012).
   219   220   221   222   223   224   225   226   227   228   229